Network Penetration Testing Checklist

I’ve had a handful of people ask me about resources for learning how to do a basic penetration test. Gurubaran wrote a decent checklist for performing a network penetration test. The original post can be found HERE. There is a lot more effort than what is listed here however this is a good starting point for network only. I want to stress that this is only for networks meaning a true penetration test should consider more than just the network.

Network Penetration testing determines vulnerabilities on the network posture by discovering Open ports, Trouble shooting Live systems, services and grabbing system banners.

The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall rules.You should test in all ways to guarantee there is no security loophole.

Let’s see how we conduct a step by step Network penetration testing by using some famous network scanners.

1.HOST DISCOVERY

Footprinting is the first and important phase were one gather information about their target system.

Search This Blog

Search for:

Subscribe To Blog

Email Subscription

http://www.thesecurityblogger.com does not represent or endorse the accuracy or reliability of any information’s, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this website, nor the quality of any products, information’s or any other material displayed,purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein. Everything on this blog is based on personal opinion and should be interoperated as such.